Vol 2 Part 1: IP Access Control Lists Flashcards

1
Q

What layer does error recover and flow control happen at?

A

Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Between UDP and TCP, which provides error recover?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCP is defined in RFC# what?

A

RFC 793

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multiplexing relies on a concept known as a BLANK

A

Socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 things inside of a socket?

A

IP Address, Transport Protocol, and Port Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is multiplexing?

A

Streaming multiple pieces of data within a single stream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do the port numbers determine when multiplexing?

A

Port numbers are used to determine the data and its destined application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What range of ports are the well known ports that are assigned by the Internet Assigned Numbers Authority (IANA)?

A

0-1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What range of ports are considered user registered ports?

A

1024-49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two types of general protocols used with connections?

A

Connection-oriented (TCP) and connectionless (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Connection-oriented protocols require an exchange of messages before or after data transfer begins?

A

Before. A pre established correlation is made between two endpoints. This is TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or Fales: Connectionless protocols do NOT require an exchange of messages or correlation?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What fields within the TCP header are used to ensure reliability of data transfer?

A

SEQ and ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Windowing allows the receiving end to let the sending end know what?

A

How much data it can receive at the current moment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The receiving device will send a BLANK message to the sender to indicate either an increase or a decrease in its availability to receive data.

A

Window message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the uniform resource identifier (URI)?

A

The web address typed or clicked ot access a page

17
Q

What are the three key components of a URI?

A

Protocol, Server Name, and Web Page

18
Q

Web pages typically have multiple files called BLANK

A

objects

19
Q

What are the two basic types of Access Control Lists (ACLs)?

A

Standard and Extended

20
Q

Standard and Extended ACLs have two main sub types; what are they?

A

Numbered and Named

21
Q

What is the difference between a standard and an extended ACL?

A

A standard ACL just uses a matching Source IP

An extended ACL using a matching source AND destination IP, as well as a source and destination port.

22
Q

Where do ACLs reside?

A

On the router

23
Q

What command is used to create an ACL?

A

ip access-list standard or extended name of ACL

24
Q

When creating a rule to permit/deny a range of IP addresses, what is typed in after the IP address to signify the range of IPs?

A

A wildcard

25
Q

Explain how a wild card works with regards to the permitted/denied range of IPs?

A

An octet in the wild card containing a number other than 0 corresponds to the octet in the IP address. This octet will be ignored when the ACL is choosing to permit or deny an IP address. For example. the command “access-list 1 permit 10.1.1.1” will permit that IP address only. However, the command “access-list 1 permit 10.1.1.0 0.0.0.255” will permit any IP address in the range 10.1.1.0-10.1.1.255

26
Q

A standard access list has what for a default initial range?

A

1-99

27
Q

A standard ACL should always be placed where in relation to the source and destination?

A

As close to the destination as possible

28
Q

An extended ACL should always be placed where in relation to the source and destination?

A

As close to the source as possible

29
Q

In general, where should your more specific rules in your ACL be placed within the ACL and why?

A

Towards the beginning. This is because the ACL will check the rules in order from first to last. If you want to deny a specific IP address, but it is within a range of permitted IP addresses, the IP address will be permitted if the router hits the permit rule for that range before it hits the deny rule for that specific IP.